Applied Cryptography
Failed to add items
Sorry, we are unable to add the item because your shopping cart is already at capacity.
Add to Cart failed.
Please try again later
Add to Wish List failed.
Please try again later
Remove from wishlist failed.
Please try again later
Adding to library failed
Please try again
Follow podcast failed
Please try again
Unfollow podcast failed
Please try again
Audible Standard 30-day free trial
Select 1 audiobook a month from our entire collection of titles.
Yours as long as you’re a member.
Get unlimited access to bingeable podcasts.
Standard auto renews for $8.99 a month after 30 days. Cancel anytime.
Buy for $9.50
-
Narrated by:
-
Virtual Voice
-
By:
-
Ajit Singh
This title uses virtual voice narration
Virtual voice is computer-generated narration for audiobooks.
Philosophy: From Theory to Action
The core philosophy of this book is "learning by building." Traditional cryptography texts often prioritize complex mathematical proofs and theoretical constructs, which, while important, can create a barrier for those whose primary goal is to write secure code. This book inverts that approach. I start with a practical problem—like the need to send a secret message—and then introduce the cryptographic concept and algorithm that solves it. Every theoretical explanation is immediately followed by a step-by-step implementation guide, allowing readers to see the principles in action and build a tangible understanding. The guiding principle is that one cannot truly grasp cryptography without implementing it.
Key Features: What Makes This Book Different
1. Application-Oriented: The primary focus is on how to use cryptography, not just how it works.
2. Step-by-Step Implementations: Clear, numbered algorithms and corresponding code for every major concept.
3. Practical Examples & Case Studies: Each chapter includes real-life examples (e.g., securing web traffic, encrypting emails, blockchain hashing) to illustrate the concepts.
4. Complete Capstone Project: A full, working DIY project with source code to build a secure file transfer application, demonstrating the integration of multiple cryptographic techniques.
5. Modern & Updated Content: Covers modern standards like AES, RSA, ECC, SHA-3, and protocols like TLS 1.3, providing relevant skills for today's technology landscape.
6. Visual Aids: Includes diagrams and architectural illustrations to explain complex systems like PKI, the TLS handshake, and cryptographic modes of operation.
7. Clear and Accessible Language: Complex topics are broken down into simple, easy-to-understand explanations, making the book suitable for beginners and a useful reference for advanced learners.
Key Takeaways: Skills You Will Acquire
After completing this book, the reader will be able to:
1. Understand the core objectives of cryptography: Confidentiality, integrity, authentication, and non-repudiation.
2. Select the appropriate cryptographic algorithm for a given security task.
3. Implement symmetric and asymmetric encryption to protect data in transit and at rest.
4. Use cryptographic hash functions to verify data integrity.
5. Create and verify digital signatures to ensure authenticity and non-repudiation.
6. Understand and implement a secure key exchange protocol like Diffie-Hellman.
7. Grasp the architecture and components of a Public Key Infrastructure (PKI).
8. Analyze the security of real-world protocols like TLS/SSL.
9. Build a complete, secure application from scratch by integrating various cryptographic primitives.
Disclaimer: Earnest request from the Author.
Kindly go through the table of contents and refer kindle edition for a glance on the related contents.
Thank you for your kind consideration!
No reviews yet